Reader small image

You're reading from  Digital Forensics and Incident Response

Product typeBook
Published inJul 2017
PublisherPackt
ISBN-139781787288683
Edition1st Edition
Concepts
Right arrow
Author (1)
Gerard Johansen
Gerard Johansen
author image
Gerard Johansen

Gerard Johansen is an incident response professional with over 15 years' experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cyber crime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance. Gerard is a graduate of Norwich University's Master of Science in Information Assurance program and a certified information systems security professional. He is currently employed as a senior incident response consultant with a large technology company, focusing on incident detection, response, and threat intelligence integration.
Read more about Gerard Johansen

Right arrow

Analyzing network log files


Chapter 3, Network Evidence Collection, contained a good deal of information concerning the acquisition of network-based evidence and the types of log files that are of importance to incident response analysts. Aside from the previously covered packet capture, there was a good deal focused on the acquisition of log files from a variety of sources. These log files can provide some insight into the potential indicators of compromise that can aid in an incident investigation. The main challenge though for analysts is sifting through all of the non-relevant logs to find those that have some evidentiary value.

Log file analysis can be performed in a variety of ways. The specific method that is used may often depend on the type of incident, the tools available, and the amount of log data that has to be analysed. The following are some of the methods that can be utilized:

  • Manual log review: In a manual log review, raw log files are dumped into a tool such as a text editor...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Digital Forensics and Incident Response
Published in: Jul 2017Publisher: PacktISBN-13: 9781787288683

Author (1)

author image
Gerard Johansen

Gerard Johansen is an incident response professional with over 15 years' experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cyber crime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance. Gerard is a graduate of Norwich University's Master of Science in Information Assurance program and a certified information systems security professional. He is currently employed as a senior incident response consultant with a large technology company, focusing on incident detection, response, and threat intelligence integration.
Read more about Gerard Johansen